Most Discussed Posts

Tech Time Warp: Where did Carmen Sandiego come from?
The same generation of schoolchildren who traveled the Oregon Trail also crisscrossed the globe in hot pursuit of one international supervillain named Carmen Sandiego. Apple’s early investment in the education market meant schools were filled with Apple IIs and children eager...

7 pieces of advice for women entering the channel
This week, CRN, a brand of The Channel Company, announced its highly respected Women of the Channel list for 2022. We’re excited to share that a total of seven Barracuda team members made the prestigious list!

Tech Time Warp: On the hunt for technology easter eggs
Have you ever typed “answer to life, the universe, and everything” into Google? In a nod to The Hitchhiker’s Guide to the Galaxy, Google returns “42” as a calculator result. Or perhaps you’ve explored the police call box on the...

Tech Time Warp: The history of the indestructible QR code
In the hazy “before times” of late 2019 and early 2020, the QR Code was the butt of many jokes. A QR Code seemed passé—almost like putting “e” or “I” at the beginning of a new device’s name and considering...

Cybersecurity is everyone’s responsibility
This post is part of our ongoing conversations with industry experts about the ever-present problem of data breaches. These breaches usually trace back to the security teams, but everyone, even the average user, is considered a stakeholder in cybersecurity. IBM...

MSPs need to monitor changing attitudes toward cloud service providers
A survey of 1,000 IT leaders suggests that going into 2022 managed service providers (MSPs) will soon find themselves caught between their loyalty to the major cloud service providers and end customers that believe they are being overcharged for services...

How one important metric can make or break your MSP business
I previously wrote a blog post for SmarterMSP on Why your MSP needs to stop relying on gut feelings. When I was running my Managed Service Provider (MSP) business, I was always taught that “What can be measured, can be...

How hackers use phishing in ransomware attacks
Phishing attacks work because people like to click on things. Hackers carefully tailor attacks to their victims by collecting publicly available personal information about them and playing to their sense of urgency to get a response. The attackers only need...

Cybersecurity Threat Advisory: The recent Facebook outage
On October 4, 2021, the global social network Facebook and its associated platforms faced a global outage that lasted approximately six hours. This outage not only impacted all Facebook users, but it also blocked internal communication between its employees and...